We found results for “”
CVE-2024-4264
Good to know:
Date: May 17, 2024
A remote code execution (RCE) vulnerability exists in the berriai/litellm project due to improper control of the generation of code when using the "eval" function unsafely in the "litellm.get_secret()" method. Specifically, when the server utilizes Google KMS, untrusted data is passed to the "eval" function without any sanitization. Attackers can exploit this vulnerability by injecting malicious values into environment variables through the "/config/update" endpoint, which allows for the update of settings in "proxy_server_config.yaml".
Language: Python
Severity Score
Related Resources (9)
Severity Score
Weakness Type (CWE)
Improper Control of Generation of Code ('Code Injection')
CWE-94CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | HIGH |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | HIGH |
| Integrity (I): | HIGH |
| Availability (A): | HIGH |
Vulnerabilities
Projects
Contact Us


